Skip to content

Future of Cybersecurity — Quantum Computing, Autonomous Security, and AI Arms Race

What Is the Future of Cybersecurity and Why Does It Matter?

Section titled “What Is the Future of Cybersecurity and Why Does It Matter?”

The World Economic Forum Global Risks Report (2024) ranks cyber insecurity among the top 10 global risks for the coming decade, while Gartner projects that by 2027, over 75% of organisations will have restructured their security architectures to account for AI-driven threats and post-quantum cryptography migration.

The future of cybersecurity is being shaped by three converging forces: quantum computing that threatens current encryption, artificial intelligence that empowers both attackers and defenders, and an ever-expanding attack surface driven by cloud adoption, IoT proliferation, and remote work. For anyone entering the cybersecurity field — especially career changers — understanding where the industry is heading helps you invest your learning time wisely and position yourself for roles that will exist in 3-5 years, not just today.

This is not a speculative science fiction overview. Every trend discussed here is grounded in current research, existing early-stage technology, or published standards and timelines. Where timelines are uncertain, that uncertainty is acknowledged. The goal is to help you separate genuine emerging trends from marketing hype.

When I started my cybersecurity journey, I worried about learning skills that might become obsolete. Then I realised that the fundamentals — understanding risk, knowing how attacks work, thinking like both attacker and defender — are timeless. The tools change, but the thinking endures. Learning about quantum threats and AI trends is not about predicting the future perfectly. It is about developing the adaptability that makes you valuable no matter which specific technologies dominate.

Certification context: CompTIA Security+ SY0-701 covers emerging threats including quantum computing impacts, AI-driven attacks, and post-quantum cryptography. CEH v13 addresses AI in offensive security and future attack vectors.

What Do Real-World Emerging Threats Look Like?

Section titled “What Do Real-World Emerging Threats Look Like?”

NIST has identified the harvest-now-decrypt-later threat as an immediate risk, prompting the publication of FIPS 203, 204, and 205 — the first post-quantum cryptographic standards — in 2024 after an 8-year selection process.

These are not theoretical concerns — they represent challenges that organisations are actively preparing for today.

Emerging threatWhat it threatensTimeline
Quantum computing breaking RSA/ECCAll current asymmetric encryption — HTTPS, VPNs, digital signatures, PKICryptographically relevant quantum computers estimated 2030-2040, but “harvest now, decrypt later” attacks are happening today
AI-generated phishingEmail security, human awareness training, social engineering defencesAlready in use. LLMs generate convincing, personalised phishing at scale with near-perfect grammar
Deepfakes for identity fraudVoice biometrics, video verification, executive impersonationActive threat today. Voice cloning requires <30 seconds of sample audio
Polymorphic AI malwareSignature-based antivirus, static analysis toolsEarly stage. AI-generated malware that rewrites itself to evade detection
Autonomous attack toolsSecurity teams’ ability to respond at human speedEmerging. AI agents that can scan, exploit, and pivot without human guidance
Expanding attack surfaceTraditional perimeter-based security modelsOngoing. Cloud, IoT, OT convergence, and remote work dissolve the network boundary

How Does the Future of Cybersecurity Work?

Section titled “How Does the Future of Cybersecurity Work?”

The NIST AI Risk Management Framework (AI 100-1) and NIST Post-Quantum Cryptography project together provide the authoritative standards for understanding how AI and quantum computing are reshaping the cybersecurity landscape.

Think of cybersecurity’s future as an arms race where both sides are upgrading their weapons simultaneously. Defenders get AI-powered detection and automated response. Attackers get AI-powered evasion and automated exploitation. The advantage goes to whoever adapts faster — and that is why continuous learning is the most important skill for a cybersecurity career.

Current asymmetric encryption (RSA, ECC, Diffie-Hellman) relies on mathematical problems that are practically impossible for classical computers to solve. Quantum computers, using Shor’s algorithm, could solve these problems efficiently — breaking the encryption that secures virtually all internet communication.

What is at risk:

Cryptographic methodQuantum impactStatus
RSA (2048-4096 bit)Broken by Shor’s algorithmVulnerable — transition to PQC needed
ECC (P-256, P-384)Broken by Shor’s algorithmVulnerable — transition to PQC needed
Diffie-HellmanBroken by Shor’s algorithmVulnerable — transition to PQC needed
AES-128Weakened by Grover’s algorithm (effective key halved)Use AES-256 — remains secure against quantum
AES-256Reduced to ~AES-128 equivalent securityStill considered secure for foreseeable future
SHA-256Reduced collision resistance via Grover’sStill considered practically secure

“Harvest now, decrypt later” is the most immediate quantum threat. Adversaries — especially nation-states — are intercepting and storing encrypted communications today with the expectation of decrypting them once quantum computers are available. Sensitive data with a long secrecy requirement (government secrets, medical records, financial data) is already at risk.

NIST finalised its first post-quantum cryptographic standards in 2024 after an 8-year selection process:

StandardAlgorithmPurposeBased on
FIPS 203ML-KEM (CRYSTALS-Kyber)Key encapsulation (key exchange)Module lattice problems
FIPS 204ML-DSA (CRYSTALS-Dilithium)Digital signaturesModule lattice problems
FIPS 205SLH-DSA (SPHINCS+)Digital signatures (hash-based backup)Hash-based cryptography

These standards are designed to resist both classical and quantum attacks. Organisations are beginning the transition, but migrating global infrastructure from RSA/ECC to PQC is a multi-year effort.

Attacker capabilityDefender capability
AI-generated phishing emails with perfect grammar and personalisationAI-powered email analysis using NLP to detect intent and anomalies
Polymorphic malware that rewrites code to evade signaturesML-based behavioural analysis that detects by action, not code
Automated vulnerability scanning and exploitation at scaleAutomated patching prioritisation and faster response via SOAR
Deepfake voice and video for social engineeringDeepfake detection tools and multi-factor verification
AI-assisted reconnaissance and OSINT gatheringAI-powered threat intelligence correlation
Adversarial ML to evade AI detection systemsAdversarial training and multi-layered detection approaches

The key insight: AI is a force multiplier for both sides. The advantage goes to the side that implements AI more effectively, with better data and better processes — not just better algorithms.

These are practical steps for organisations and individuals to prepare for emerging cybersecurity threats.

Step 1 — Begin Cryptographic Inventory (Quantum Readiness)

Section titled “Step 1 — Begin Cryptographic Inventory (Quantum Readiness)”

Organisations need to catalogue every system that uses cryptography — TLS certificates, VPNs, code signing, database encryption, API authentication. You cannot migrate to post-quantum cryptography if you do not know where current cryptography lives. This is called a “cryptographic inventory” or “crypto agility assessment.”

Design systems so cryptographic algorithms can be swapped without rebuilding the entire system. Crypto-agility means your applications reference a configurable algorithm choice rather than hard-coding RSA-2048. This makes the eventual PQC migration far less disruptive.

Step 3 — Adopt Hybrid Cryptography During Transition

Section titled “Step 3 — Adopt Hybrid Cryptography During Transition”

During the PQC transition period, use hybrid approaches that combine classical and post-quantum algorithms. If either algorithm is broken, the other still provides protection. Major browsers and cloud providers are already implementing hybrid key exchange (for example, Chrome uses X25519Kyber768 for TLS).

Deploy AI-powered detection alongside traditional tools. Invest in UEBA, AI-enhanced SIEM, and SOAR automation. Train AI detection models on quality data and implement continuous feedback loops. See AI-Powered Threat Detection and AI in Cyber Defence for detailed guidance.

Update identity verification procedures to account for deepfakes. Voice-only verification for financial transactions is no longer reliable. Implement multi-channel verification (call back on a known number, confirm via separate communication channel) and consider deepfake detection technology for high-value processes.

Step 6 — Embrace Zero Trust Architecture

Section titled “Step 6 — Embrace Zero Trust Architecture”

Zero trust (“never trust, always verify”) is the architectural response to the dissolving perimeter. Every access request is authenticated and authorised regardless of network location. This model is more resilient against both current and future threats because it does not depend on a single defensible boundary.

For career changers and current practitioners alike, the most important preparation is a commitment to continuous learning. The specific technologies will change, but the ability to learn, adapt, and apply security thinking to new contexts is what defines a successful cybersecurity career.

How Does Cybersecurity’s Future Fit Into a Security Architecture?

Section titled “How Does Cybersecurity’s Future Fit Into a Security Architecture?”

CISA’s Post-Quantum Cryptography Initiative and NIST’s Cybersecurity Framework 2.0 both emphasise that organisations must begin architectural planning now for quantum-resistant systems, even before cryptographically relevant quantum computers exist.

Quantum Computing Impact Timeline

From today's harvest-now-decrypt-later to the post-quantum future — key milestones and preparation steps

Now (2024-2026)Preparation phase
Harvest-now-decrypt-later active
NIST PQC standards finalised
Crypto inventory and agility planning
Hybrid key exchange in browsers
Near-Term (2027-2030)Migration begins
PQC adoption in major protocols
TLS 1.4 with PQC support expected
Government mandates for PQC transition
Legacy system migration challenges
Mid-Term (2030-2035)Critical transition
Early quantum computers reaching useful scale
RSA/ECC deprecation in high-security contexts
PQC as standard for new deployments
Crypto-agility becomes essential
Long-Term (2035+)Post-quantum era
Cryptographically relevant quantum computers
Full PQC migration required
Quantum key distribution niche use
New threat and defence paradigms
Idle

Current Cryptography vs Post-Quantum Cryptography

Section titled “Current Cryptography vs Post-Quantum Cryptography”

Current Cryptography vs Post-Quantum Cryptography

Current Cryptography
  • RSA, ECC, Diffie-HellmanBased on integer factorisation and elliptic curve problems
  • Proven over decadesBattle-tested since the 1970s-1990s in production systems
  • Vulnerable to quantumShor's algorithm breaks these with a sufficiently large quantum computer
  • Small key sizesRSA-2048: 256 bytes, ECC P-256: 32 bytes — efficient for constrained devices
  • Mature toolingUniversal support in every TLS library, browser, and operating system
VS
Post-Quantum Cryptography
  • Lattice-based and hash-basedML-KEM (Kyber), ML-DSA (Dilithium), SLH-DSA (SPHINCS+)
  • Newly standardised (2024)NIST FIPS 203, 204, 205 — early-stage production deployment
  • Quantum-resistantBased on problems believed hard for both classical and quantum computers
  • Larger key sizesML-KEM: ~1.5 KB, ML-DSA: ~2.5 KB — bandwidth and storage implications
  • Evolving toolingLibrary support growing rapidly but not yet universal
Verdict: The transition from current to post-quantum cryptography is a multi-year effort. Hybrid approaches (combining both) provide safety during the transition. Start planning now — the harvest-now-decrypt-later threat makes this urgent.
Use case
Organisations handling sensitive data with long secrecy requirements (government, healthcare, finance) should begin PQC transition planning immediately. Others should ensure crypto-agility.

What Does the AI Arms Race Look Like in Practice?

Section titled “What Does the AI Arms Race Look Like in Practice?”

The World Economic Forum Global Cybersecurity Outlook 2024 reports that AI-powered cyberattacks are the top emerging concern for cybersecurity leaders, with deepfake-enabled social engineering and AI-generated phishing identified as immediate operational threats.

Attack scenario: CEO Fraud via Voice Deepfake
Setup:
- Attacker obtains 30 seconds of CEO's voice from public earnings call
- Voice cloning model trained in under 5 minutes
- Attacker calls CFO, impersonating CEO's voice
Call transcript:
"Attacker" (AI-cloned CEO voice): "Hi Sarah, I need you to process
an urgent wire transfer. I'm in a meeting so I can't email. Transfer
$250,000 to the account I'm about to give you. It's for the
acquisition we discussed last week."
CFO: "Of course. Let me get the details..."
Why this works:
- Voice sounds identical to CEO (verified by CFO's ear)
- Urgency prevents careful verification
- Contextual details (acquisition) add credibility
- Phone-only communication has no visual verification
Defence:
1. Policy: Wire transfers over $X require multi-channel verification
2. Process: Call back on known number, not the incoming call
3. Code word: Pre-established verbal authentication code
4. Technology: AI-powered voice authentication that detects deepfake artifacts
5. Culture: Empower employees to challenge any urgent request regardless
of apparent seniority

Example 2: Post-Quantum Cryptography Migration Assessment

Section titled “Example 2: Post-Quantum Cryptography Migration Assessment”
Cryptographic Inventory — PQC Migration Assessment
System: Customer API Gateway
Current cryptography:
- TLS 1.3 with ECDHE-P256 key exchange
- RSA-2048 certificates
- AES-256-GCM data encryption
Quantum risk assessment:
- Key exchange (ECDHE): VULNERABLE — replace with ML-KEM (Kyber)
- Certificates (RSA-2048): VULNERABLE — replace with ML-DSA (Dilithium)
- Data encryption (AES-256): SECURE — no change required
Migration plan:
Phase 1: Deploy hybrid key exchange (X25519 + ML-KEM-768)
Phase 2: Transition certificates to ML-DSA when CA support matures
Phase 3: Remove classical-only cipher suites
Phase 4: Verify crypto-agility for future algorithm changes
Dependencies:
- TLS library update (OpenSSL 3.5+ or BoringSSL with PQC)
- Load balancer firmware update
- Client compatibility testing
- Certificate authority PQC support
Priority: HIGH — API handles financial data with 10+ year secrecy requirement

Example 3: AI-Assisted Attack vs AI-Assisted Defence

Section titled “Example 3: AI-Assisted Attack vs AI-Assisted Defence”
Scenario: AI-Powered Attack Chain vs AI-Powered Defence
ATTACK (AI-assisted):
1. Reconnaissance: AI scrapes LinkedIn, company website, public documents
-> Builds organisational chart and identifies targets
2. Weaponisation: LLM generates personalised phishing email per target
-> Perfect grammar, references real projects, mimics internal style
3. Delivery: AI selects optimal send time per target based on email patterns
4. Exploitation: Polymorphic payload changes signature on each delivery
5. Lateral movement: AI agent scans internal network, finds paths to
crown jewels
DEFENCE (AI-assisted):
1. AI email analysis detects phishing via intent analysis + sender anomaly
-> Catches 3 of 5 emails before delivery
2. UEBA flags recipients who clicked link (anomalous process execution)
-> Automated endpoint isolation within 90 seconds
3. Network ML detects unusual lateral movement patterns
-> SOAR playbook blocks attacker's internal pivot
4. Threat intelligence AI correlates attack indicators across all signals
-> Full attack scope mapped within 15 minutes
5. Automated remediation: compromised credentials reset, endpoints reimaged
Result: Attack partially successful (2 endpoints compromised) but contained
before reaching crown jewels. Without AI defence: likely full breach.
TechnologyWhat it doesMaturityCareer relevance
Post-quantum cryptographyEncryption resistant to quantum computersStandards finalised, deployment startingHigh — every security role will touch PQC migration
Zero trust architectureNever trust, always verify — remove implicit trustWidely adopted, maturing rapidlyHigh — foundation of modern security architecture
Extended Detection and Response (XDR)Unified detection across endpoints, network, cloud, emailMainstream adoptionHigh — SOC analyst roles increasingly use XDR platforms
Confidential computingData encrypted even while being processed in memoryEarly production useMedium — relevant for cloud security and privacy roles
Quantum key distribution (QKD)Uses quantum mechanics for theoretically unbreakable key exchangeNiche, short-range, expensiveLow for most — relevant for government and research
Autonomous security operationsSelf-healing systems that detect, respond, and remediate without human inputEarly research and limited productionMedium — augments, not replaces, human analysts

What Are the Limitations of Emerging Security Technologies?

Section titled “What Are the Limitations of Emerging Security Technologies?”

Gartner’s Hype Cycle for Cybersecurity consistently identifies a gap between the marketed promise of emerging technologies and their production-ready reality, emphasising the importance of separating genuine capabilities from vendor hype.

Understanding the real constraints of emerging security technologies prevents both overconfidence and unnecessary fear.

Emerging trendOverhyped claimGrounded reality
Quantum computing”Quantum will break all encryption tomorrow”Cryptographically relevant quantum computers are estimated 2030-2040. AES-256 remains secure. The real urgency is harvest-now-decrypt-later
Post-quantum cryptography”PQC is a drop-in replacement”PQC has larger key sizes, different performance characteristics, and requires infrastructure-wide changes. Migration is a multi-year effort
AI security”AI will replace human security analysts”AI augments analysts by handling volume and speed. Human judgement, creativity, and contextual understanding remain essential
Zero trust”Implement zero trust and you are secure”Zero trust is an architecture model, not a product. It requires comprehensive identity management, micro-segmentation, and continuous verification — none of which are trivial
Autonomous security”Self-healing systems need no humans”Full autonomy is aspirational. Current “autonomous” systems handle well-understood scenarios; novel threats still require human investigation
Deepfake detection”AI can reliably detect all deepfakes”Detection is an arms race. Deepfake generation quality improves alongside detection, and no current solution is 100% reliable
Section titled “What Interview Questions Should You Expect About Future Cybersecurity Trends?”

CompTIA Security+ SY0-701 Domain 1 (General Security Concepts) and Domain 2 (Threats, Vulnerabilities, and Mitigations) both include objectives on quantum computing impacts, AI-driven threats, and post-quantum cryptography.

Interviewers test whether you can think critically about emerging threats without falling for hype.

QuestionWhat they are testingStrong answer approach
What is the quantum computing threat to cybersecurity?Understanding of a key emerging riskExplain Shor’s algorithm breaks RSA/ECC, AES-256 remains secure, NIST PQC standards exist, and the harvest-now-decrypt-later threat makes preparation urgent now
What is post-quantum cryptography?Awareness of the solution, not just the problemReference NIST standards (ML-KEM, ML-DSA), lattice-based cryptography, the hybrid transition approach, and that migration is a multi-year infrastructure effort
How is AI changing the threat landscape?Balanced understandingDiscuss both sides: AI enables more convincing phishing, polymorphic malware, and automated attacks, while defenders use AI for detection, response, and threat hunting. The advantage goes to the side that implements AI more effectively
What cybersecurity skills will be most important in 5 years?Career awareness and adaptabilityEmphasise adaptability and continuous learning, then mention specific areas: cloud security, AI/ML security, PQC migration, zero trust architecture, and the enduring value of fundamentals like risk management and incident response
What is a deepfake and why does it matter for security?Awareness of social engineering evolutionExplain AI-generated synthetic media, its use for CEO fraud and identity verification bypass, and practical defences like multi-channel verification and deepfake detection technology

How Are Emerging Threats Addressed in Real Security Operations?

Section titled “How Are Emerging Threats Addressed in Real Security Operations?”

The Australian Cyber Security Strategy 2023-2030 identifies AI-enabled threats and quantum computing as key future challenges, committing to national investment in cyber resilience, skills development, and critical infrastructure protection.

Australia’s cybersecurity posture is actively evolving to address emerging threats, creating opportunities for career changers.

ASD and quantum preparedness: The Australian Signals Directorate has published guidance on preparing for the quantum computing threat. The ASD ISM (Information Security Manual) is being updated to include PQC requirements for government systems. Organisations handling classified information will be among the first required to transition.

Australia’s Cyber Security Strategy 2023-2030: The Australian Government’s strategy identifies AI-enabled threats and quantum computing as key future challenges. It commits to strengthening national cyber resilience, investing in skills development, and supporting critical infrastructure protection — all areas creating demand for cybersecurity professionals.

Skills gap as opportunity: Australia faces a significant cybersecurity skills shortage — estimated at 30,000+ unfilled positions. This gap is expected to grow as quantum transition, AI security, and regulatory compliance (SOCI Act, Privacy Act reform) create demand for new specialisations. Career changers who invest in emerging skills position themselves for strong job market demand. Individual results vary based on effort, location, and market conditions.

Industry growth: The Australian cybersecurity industry is projected to continue rapid growth, driven by government investment, regulatory requirements, and increasing threat sophistication. Roles in cloud security, AI security, GRC (governance, risk, and compliance), and security architecture are among the fastest growing.

Practical career advice: Do not try to learn everything about the future at once. Build strong fundamentals first (networking, operating systems, security concepts), then specialise in one emerging area that interests you. The combination of solid fundamentals plus one forward-looking specialisation makes you highly employable.

The future of cybersecurity is shaped by quantum computing, artificial intelligence, and an expanding attack surface — but fundamentals remain the foundation.

  • Quantum computing threatens RSA, ECC, and Diffie-Hellman via Shor’s algorithm. AES-256 and SHA-256 remain secure. The harvest-now-decrypt-later threat makes preparation urgent today, even though cryptographically relevant quantum computers are estimated 2030-2040.
  • Post-quantum cryptography standards (ML-KEM, ML-DSA, SLH-DSA) are finalised. Transition is a multi-year infrastructure effort — begin with cryptographic inventory and crypto-agility.
  • The AI arms race empowers both attackers (AI phishing, polymorphic malware, automated exploitation) and defenders (AI detection, SOAR automation, threat hunting). The advantage goes to effective implementation, not just technology.
  • Deepfakes are an active threat today. Voice cloning and video deepfakes require updated verification procedures beyond single-channel confirmation.
  • Zero trust architecture is the dominant security model going forward — never trust, always verify, regardless of network location.
  • The cybersecurity skills gap is real and growing, creating strong career opportunities for career changers who build solid fundamentals and invest in emerging specialisations.
  • Continuous learning is the most important skill. Technologies will change, but the ability to adapt, learn, and apply security thinking to new contexts is what defines a lasting career.

Frequently Asked Questions

When will quantum computers break current encryption?

Estimates for cryptographically relevant quantum computers range from 2030 to 2040, though there is significant uncertainty. The more immediate concern is harvest-now-decrypt-later attacks, where adversaries collect encrypted data today to decrypt once quantum computers are available. This makes preparation urgent now, especially for data with long secrecy requirements.

What is post-quantum cryptography?

Post-quantum cryptography (PQC) refers to cryptographic algorithms designed to resist attacks from both classical and quantum computers. NIST finalised its first PQC standards in 2024: ML-KEM (Kyber) for key exchange and ML-DSA (Dilithium) for digital signatures. These are based on mathematical problems (like lattice problems) that quantum computers cannot solve efficiently.

Is AES-256 safe from quantum computers?

Yes, for the foreseeable future. Grover's algorithm reduces AES-256 to roughly AES-128 equivalent security against quantum computers — still considered secure. The main quantum threat is to asymmetric encryption (RSA, ECC), not symmetric encryption. Using AES-256 provides a comfortable security margin.

What is harvest-now-decrypt-later?

Harvest-now-decrypt-later is a strategy where adversaries intercept and store encrypted data today, anticipating they will be able to decrypt it once sufficiently powerful quantum computers exist. This is particularly concerning for data with long-term secrecy requirements — government communications, medical records, financial data, and trade secrets.

How is AI changing cyber attacks?

AI enables more convincing phishing emails (LLM-generated, personalised), polymorphic malware that rewrites itself to evade detection, deepfake voice and video for social engineering, automated vulnerability scanning and exploitation, and adversarial techniques to evade AI-based defences. The attacks are faster, more scalable, and harder to detect.

What is a deepfake and how is it used in attacks?

A deepfake is AI-generated synthetic media — a fake but realistic voice recording, video, or image. In cybersecurity, deepfakes are used for CEO fraud (cloning an executive's voice to authorise wire transfers), identity verification bypass (video deepfakes), and disinformation campaigns. Current voice cloning requires less than 30 seconds of sample audio.

Will AI replace cybersecurity jobs?

AI will change cybersecurity jobs, not eliminate them. Repetitive tasks (alert triage, basic enrichment, known-pattern containment) will be increasingly automated. But complex investigation, threat hunting, strategic security decisions, and adapting to novel threats require human judgement. The role evolves from manual operator to strategic analyst.

What is zero trust architecture?

Zero trust is a security model based on the principle of never trust, always verify. Every access request is authenticated and authorised regardless of network location — there is no implicit trust for devices inside the corporate network. Key components include strong identity verification, micro-segmentation, least privilege access, and continuous monitoring.

What cybersecurity skills should I learn for the future?

Build strong fundamentals first: networking, operating systems, security concepts, and incident response. Then specialise in emerging areas: cloud security, AI/ML security, post-quantum cryptography, zero trust architecture, or governance and compliance. The most valuable skill is adaptability — the ability to learn new technologies and apply security principles to new contexts.

Is cybersecurity a good career for career changers?

Yes. The cybersecurity skills gap is significant and growing — Australia alone has an estimated 30,000+ unfilled positions. Career changers bring valuable perspectives from other industries. Building solid fundamentals, earning a certification like CompTIA Security+, and developing hands-on skills through labs and practice make you competitive. Individual results vary based on effort, location, and market conditions.


Technical concepts verified in March 2026 against NIST PQC standards (FIPS 203, 204, 205), ASD quantum readiness guidance, the Australian Cyber Security Strategy 2023-2030, and current research on quantum computing timelines. Emerging technology timelines are estimates and subject to change — verify against current sources for the latest assessments.